Saturday, November 8, 2014

Virus Laden Troll Links at ENENEWS, Trojan Nuke Troll

FINALLY!

The trolls at ENE have really helped again. Read this nightmare, but don't worry, there is a happy ending.

A few weeks ago, a troll had placed a link supposedly to a research paper, on ENENEWS. Indeed, the paper was there, but apparently a pretty sophisticated payload consisting of virus "Smart Guard" and others viral forms also infected my main computer. I was only running AVG which is a free virus scanner at the time. This was a pretty nasty virus. It would change the security settings on my browser, so even to view a PDF you were forced to reconfigure your security settings, which were incidentally toggled to the "custom range" in which it would be easy for someone to open up way to much security in an effort to get the download or view the file they want. Once your security settings were "loosened" then the virus would use that opening to inject even more nasty stuff. Ya, they got me.

BEWARE OF TROLLS BEARING GIFTS and LINKS

The virus also prevented the installation of virus removal software like Malware Bytes, and prevented a drive imaging program from making a backup copy of the OS drive. I am sure it was preventing other things from running also, but those were so of my main tools to protect data and extract the nastys.

So this post is about informing people of some basic computer tools that really work, and are relatively low cost compared to spending days fixing a computer or limping along with decreased functionality, aka poorly name "workarounds".

Another surprising aspect of this latest infection is that it deleted all my restore points! These are the Restore Points builts into Windows 7. It is amazing that Windows 7 would allow anything other than "full control" over your computer from an admin account to delete restore points.

1) Restore Points is used by Windows to revert to a previous time, when you weren't having problems. You lose no data either, just the system files are Restored. This is a powerful and simple tool that anyone can use, and you should know about it. Well its powerful unless your nuke industry virus providers found a way to delete your restore points! LOL, ouch.

The virus also partly took over Outlook 2010 and created a folder within Outlook that said "Infected Items" in which there was one email bolded within there. That was surprising and of course I did not click it. Hmmm, maybe Bill Gates ought to spend a little on hardening our basic communications systems rather than filling the world with vaccines.

The virus also created millions of files in my Operating System drive in a user "Temp" file which bloated the hard drive with hundreds of gigabytes of junk data, literally millions of files. This made the hard drive highly fragmented and HUGE. The massive size made it impossible to a "Drive Image" which is a form of backup.

Finally, the virus seemed to want to do two things that I know of. It would try to send packets of information out (to Russia). I had installed ESET NOD32 Antivirus 6 (this program was unable to remove the viruses in their entirety, FYI) and ESET was able to prevent these outgoing packets, sometimes 2 or 3 in 5 seconds, thousands a day. I tagged the intended IP address and it appeared to be a location in Russia, although these type of things can be faked, especially by those capable of deploying and creating such a broadbased and capable virus.

And the last effect was created primarily from taking over a legitimate windows process, the process that windows uses to show thumbnail display of images in your computer, this process would replicate itself over and over again, with varying waves of taking up some or all your computer processing power. This would bring the computer to a crawl. But sometimes the computer would work OK also. Also with this, the viruses would rev up and rev down the DVD drive (in Stuxnet fashion), just making an annoying background noise. Stuxnet is a high level virus purportedly developed within the military/intelligence/nuclear community (may I say Cartel) meant to rev up and rev down centrifuges for nuclear fuels to destroy them. Certainly running your drives fast up and down, and running processors at top speed is not going to be good for them.

OK sounds pretty horrible right? Indeed, I have seen persistent malware / viruses before, but not as far reaching as this. None that tried to use my computer as a zombie transmitter.

Neither ESET nor Malwarebytes nor AVG was able to extract this beast, although they did seem to be able to knock off a few of the Medusa heads, but then the heads would them grow back in a fashion.-------------------------------------------------------------------------------------------------------------------

In a future post I am going to introduce people to some important tools that are easy enough for everyone to use.

Acronis True Image - Can completely restore your computer, even if all of the Windows restore points have been destroyed.

Malwarebytes -- a free and purchasable software program that is more capable than most

TOR - a way to surf the internet with nearly complete anonymity (caveats apply)

Backup my PC

OK The Outcome? It is always "annoying" to have to revert to an earlier "Drive Image" and find you have some unintended consequences, so you don't do so unless you have a real problem, if you have decent work arounds, you probably do those rather than "Ghost back" (an old school term for recreating your computer drive using a drive image, back in the day when Norton's 'Ghost' program was all the rage)

So faced with a "real problem" I Ghosted back my computer to June 2013 state, when it was pretty new. Whallah! Tons of problems that had built up over 1.5 years all went away, and the computer is clean and fast. Everything loads fast, windows opens fast, and it is a joy to use.

Thanks to the Nuclear Asshat Trolls who motivated me to take this simple step. Now I have full functionality on using TOR, I also regained the ability to modify Nukepro blog from my main computer, which incidentally was lost exactly as I was exposing the coverups at WIPP.

So thank you Virus laden trolls of the nuke industry at ENENEWS. Ya fixed it! LOL

Be careful of trolls bearing gifts and links. At least make sure you have some real virus and malware running.=====================================Apparently I wasn't the only one to get hit

I lost 2 hard drives connected to the same computer within 24 hours of each other..what are the chances of that one? Slim to none. Evil walks tall these days..===================================================Another testimonial of the intentional damage caused by the nuke cartel

Yes. stock. My machine was infected from pigman's links. You may have noticed he bragged about his criminal asshosiates in the basement of the ciansa building cooking it up for us. The malware/trogans/viruses were extremely extensive on my machine. They completely took out IE. Firefox worked longer; but that lead to more misdirected links, and more trogans, malware, and virus info downloaded when pages were closed out. It/they destroyed the Startup File. It took out the Startup Repair. It took out the Restore Points. It shut down the Antiviral Software(Microsoft's was first to go). I do not believe all this damage was done by simply one link, and one virus, trogan, or malware. I think it was cumulative. It/they tracked usage prior to disabling, and forwarded this info. I think it is best to run Anti Malware like Spybot and Malwarebytes, and Antiviral Software Scans,(I like AVG) before shutting down. I did not format the hdd, and reinstall the OS. I defeated all their malware, trogans, and viruses manually. Now, I think it is best to be prepared to re-format and re-install the OS; given all the time it took to remove their "above the law" criminal ELEtist distractions. We must be doing something right here on ENEnews. No Nukes. Peace---------------------------------------------------------From the Good Doctor

My computer got more than 180 mal files when I linked to WesternKyMan's links at ATS. I'm having to scan everyday now, although I think I got rid of the mess from WKM's links. I go into control panel and look at the date a program got added and delete anything new that I can't identify. Also I restored Firefox to original defaults and got rid of junk that way. Also I look for any toolbar programs to delete and and any unwanted add-on .

Heads up peeps. I just killed a hidden cmd.exe process earlier today, with no applications running. Did a full root kit scan and an attempt was made to root my box. All the other boxes on my lan are clean.I'm fairly savvy at this, but I killed the hidden command window before I could look at it. It is interesting that this is the route chosen…I see it as an opportunity to log some offenses.Those of you who are tech savy know that this change of tactics is easily logged and easily analyzed.It is a federal offense to maliciously tamper with a computer over the internet.I'm off to scan some logs and enable some more tools…===================================Bungalow Phil

stock,Yes, indeed. The primary system I use is virtually handicapped past few weeks. It takes sometimes 30 seconds for a dialog box to respond to a command or simple keystroke. If you say it is troll linx I wouldn't know, but suggesting a robust detection and prevention program would be helpful. By the way my system says it is functioning normally.Thanks

Bungalow, If on windows, you can do ctrl=alt=del and then select task manager, this will show you what is running, and another tab shows you how much CPU is being used.Thats a start. Download Malwarebytes (the free version works fine) and run it, might take an hour even. What other antivirus AV are you running?---------------------Check your internet....is the virus sending out packets from your computer? This is the most disturbing.

Get a "junk" computer. Yard out the hard drive, as you won't need it.Clean with compressed air from oil-less compressor.After all, there are minute particles that generate their own static charges (manmade radionuclides), or have conductive &/or capacitive properties which can throw some "bits" off.As you are aware, money need not always be the basis for solutions.

Quote: "Brill: In guerrilla warfare, you try to use your weaknesses as strengths.

Robert Clayton Dean: Such as?

Brill: Well, if they're big and you're small, then you're mobile and they're slow. You're hidden and they're exposed. You only fight battles you know you can win. That's the way the Vietcong did it. You capture their weapons and you use them against them the next time."http://www.imdb.com/title/tt0120660/quotes?ref_=tt_ql_3

As in audio, your power supply is the most critical piece of hardware inside.

If you have a crap power supply, usually light as a feather, expect no end of grief. That is one way Obewan might have lost both HDD's at once, that is, if it was a Desktop he was using. Perhaps viral infections were the "feather" that broke his system's back.

Well, i would assume emails, accounts, passwords, etc. may be compromised. That would seem true for at least HoTaters.

People here think am a little paranoid for not trusting the internet until the last couple of years. Then they thought i was off my rocker about Fukuppy. Now, i don't here that very often. I wonder why? I wasn't expressing concern for myself.

Also, i use a barcode reader with my own offline generated Code 128 barcodes, which allow a combination of numbers, symbols, & upper & lower case letters. The fun part is calculating the checksum value.

It does allow me to use very lengthy passwords that can be entered in seconds.

Quote: "Agreed, 59.5 Rockwell, I've often wondered how much h/she was getting paid and what other message boards were used the same way."http://enenews.com/govt-experts-fuel-rods-melting-75-minutes-after-tsunami-hit-fukushima-reactor-core-longer-covered-water-10-minutes-after-power-blackout-plant-worker-before-explosion-unit-1-filled-looked-like-steam/comment-page-1#comment-564709

Quote: "It is you, the self described "disabled one", that is lying."http://enenews.com/govt-experts-fuel-rods-melting-75-minutes-after-tsunami-hit-fukushima-reactor-core-longer-covered-water-10-minutes-after-power-blackout-plant-worker-before-explosion-unit-1-filled-looked-like-steam/comment-page-1#comment-564701

Quote: "Even for you vanne, that is about the most stupid post yet."http://enenews.com/guardian-children-navy-sailors-suffering-after-fukushima-exposure-couldnt-move-body-pain-doctor-leukemia-other-kids-diagnosed-thyroid-cancer-video/comment-page-1#comment-566617

Quote: "@SICKPUTER, the story about the guy turning back because of to high of radiation was not the truth. So here you are promoting their lies and fabricating your own. It seems that some people are falling for it. Why the lies?"http://enenews.com/top-secret-fukushima-interview-all-nuclear-fuel-will-melt-escape-containment-vessel-fear-nuclear-annihilation-entire-eastern-part-japan/comment-page-1#comment-574415

Quote: "Kind of shot yourself in the foot there. Do you just make it up as you go? And we are to take you seriously?"http://enenews.com/top-secret-fukushima-interview-all-nuclear-fuel-will-melt-escape-containment-vessel-fear-nuclear-annihilation-entire-eastern-part-japan/comment-page-1#comment-574031

I think somebody owes Sickputer an apology.

Personal attack on Razz:by itsanukularwhore

Quote: "No, not that simple. You have left out much. But don't let the facts get in the way of a false story, one that supports the hidden agenda you keep pushing!"http://enenews.com/top-secret-fukushima-interview-all-nuclear-fuel-will-melt-escape-containment-vessel-fear-nuclear-annihilation-entire-eastern-part-japan/comment-page-1#comment-574042

I think somebody owes Razz an apology.

Personal attack on Crickets:by itsanukularwhore

Quote: "I question the intent of anyone that acts as if this is the truth, especially those here at enenews."http://enenews.com/top-secret-fukushima-interview-all-nuclear-fuel-will-melt-escape-containment-vessel-fear-nuclear-annihilation-entire-eastern-part-japan/comment-page-1#comment-574040

I think somebody owes Crickets an apology too.

Personal attack on CodeShutdown:by itsanukularwhore

Quote: "I would not waste my time on this whatsoever if I didn't believe this. I haven't heard anyone else come up with anything that sounds like a good idea. For you to write this off without even looking at it is ass nine."http://enenews.com/tokyo-press-conference-officials-committing-crimes-against-humanity-fukushima-children-living-war-zone-evacuate-childhood-cancer-developing-faster-chernobyl-rate-14-times-higher-parent-im-reveal/comment-page-2#comment-566548

I think somebody owes everybody on enenews an apology.

Personal attack on WeNotTheyFinally:by itsanukularwhore

Quote: "You can't be serious. May be you should read the info on Codex again, it must not have registered with your brain."http://enenews.com/tokyo-press-conference-officials-committing-crimes-against-humanity-fukushima-children-living-war-zone-evacuate-childhood-cancer-developing-faster-chernobyl-rate-14-times-higher-parent-im-reveal/comment-page-1#comment-566421

I think somebody owes WeNotTheyFinally an apology, but that is my humble opinion.

Quote of "Jack Burton": "Son of a bitch must pay!"http://www.imdb.com/title/tt0090728/quotes

Quote of itsanukularwhore: "You are an idiot vannev, my post is not off topic, and is on topic with Dr Goodheart's post that I replied too. I have been away for a while, you must be foaming at the mouth for a chance to attack me, you and stock both. Both shills that work for TPTB, USEFUL IDIOTS!"

Quotes: "It is the highest form of self-respect to admit our errors and mistakes and make amends for them. To make a mistake is only an error in judgment, but to adhere to it when it is discovered shows infirmity of character. - Dale Turner"..."Mistakes are always forgivable, if one has the courage to admit them. - Bruce Lee"..."When we are really honest with ourselves we must admit our lives are all that really belong to us. So it is how we use our lives that determines the kind of men we are. - Cesar Chavez"..."No one should be ashamed to admit they are wrong, which is but saying, in other words, that they are wiser today than they were yesterday. - Alexander Pope"..."To err is human; to admit it, superhuman. - Doug Larson"..."Strong people make as many mistakes as weak people. Difference is that strong people admit their mistakes, laugh at them, learn from them. That is how they become strong. - Richard J. Needham"..."I am... stubborn, and I admit it, so it's OK. - Mila Kunis"..."No parent is perfect; we all can look back and think of things we could've done to help our children be better prepared for adulthood. And sometimes it's best to admit it to them and encourage them to learn from our mistakes. - Billy Graham"..."Love may not make the world go round, but I must admit that it makes the ride worthwhile. - Sean Connery"..."I don't see the point of doing an interview unless you're going to share the things you learn in life and the mistakes you make. So to admit that I'm extremely human and have done some dark things I don't think makes me unusual or unusually dark. I think it actually is the right thing to do, and I'd like to think it's the nice thing to do. - Angelina Jolie"..."I pick my nose and I'm not ashamed to admit it. If there's a bogey then just pick it, man. - Justin Timberlake"..."No one escapes being haunted by something that absolutely terrifies them to the core, but very few feel it's okay to admit what it is that haunts us. - Nicholas Brendon"..."Swallow your pride and admit that we all need help at times. - Huston Smith"..."Unlike some politicians, I can admit to a mistake. - Nelson Mandela"..."My natural-born sarcasm, when it's unimpeded, can be a bit overbearing at times and I'm the first to admit that. - Tom Bergeron"..."I do all the evil I can before I learn to shun it? Is it not enough to know the evil to shun it? If not, we should be sincere enough to admit that we love evil too well to give it up. - Mahatma Gandhi"..."If we're really honest with ourselves, most of us will admit that we want to impress people, and this is what's causing us to do what we do. - Joyce Meyer"..."No one really wants to admit they are lonely, and it is never really addressed very much between friends and family. But I have felt lonely many times in my life. - Bill Murray"..."I will be the first to admit I am not perfect and I make mistakes. - Alberto Gonzales"

You don't simply post contrarian views. That appears to me to be only based upon your own bias, and not factual, from what i have witnessed over the last year. Note that i need not an IP address to ID you.

What you and your "crew" have done and what you do will soon unravel. Wittingly or otherwise, it matters not to the police. 24000 + thousands of lurker complaints to one PD cannot be ignored. I don't desire this, yet you are bringing it down upon yourselves.

Before contacting police, we will ensure adequate and conclusive evidence is gathered, so as to not be seen to "waste their time".

Much akin to a neutered dog, it appears that you don't get it. If you won't be quiet, the least you can do is behave, and advise the same of your "crew". You do realize that you are making the anti-nuke argument for 'newsers. Skeptics are coming around due to your misbehavior, intentional or not.

Am not interested in a bunch of "yes-people" arguments, and i do see that varied perspectives can illuminate any subject. However; you continue to demonstrate that you and your "crew" could only do so on a single day or two out of a whole year. I miss that day. We did agree to disagree. Remember the "Radioactive Boy Scout"?

Please stop the Ad hominem attacks. You don't even have to change your viewpoint. I am appealing to you before it is too late. I do not hate you, yet you do seem to have some "tough love" coming your way.

Also, it would be nice if your "crew" would cease and desist from claiming "cures" for cancer on enenews. I know the effect you are gunning for, and i don't like it.

We have had quite a few inexplicable Internet outages. It was so bad last week that we replaced both the router and the modem. Its been a bit better but we are still have temporary outages. Not sure of the cause???

With 128 character possibilities (like Code 128 barcodes), a twenty-character password calculates as 291,113,021,422,017,421,452,856,827,170,390,016,000,000 permutations or about 2.91e+41 permutations! That might take some time (travel) to brute force. :)

Once again, it might be an idea to scan with AntiVirus boot disc whilst the machine is disconnected from network. Create CD/DVD media from computer known not to be infected.Note that "generic" "infections may be false-positives.

What follows is a quote concerning WiFi as an addendum to the above paragraph titled "WEP, WPA, WPS & WPA2 have been cracked".

Quote: ... "users should continue to use the strongest encryption protocol available with the most complex password and to limit access to known devices via MAC address. It might also be worth crossing one's fingers…at least until a new security system becomes available."

The Mutated Tomato here...I've had 2 computers "go south" in the last year, the most recent on 11/7/14...I can't even get it to a blue screen. Fan comes on, but that is it! Running XP. Might be BIOS related?

Yes Matt. Might be "soft bricked", but also could be a DDR memory stick or other hardware failure. Hardware failure is the first thing to rule out, and most common.Testing generally involves removing as much internal peripherals as possible, then looking for "signs of life" so-to-speak. They might only be "mostly dead". Beware that static electricity can render a "mostly dead" device utterly useless.

Quote: "Miracle Max: [...] It just so happens that your friend here is only MOSTLY dead. There's a big difference between mostly dead and all dead. Mostly dead is slightly alive. With all dead, well, with all dead there's usually only one thing you can do.Inigo Montoya: What's that?Miracle Max: Go through his clothes and look for loose change."http://www.imdb.com/title/tt0093779/quotes

Laptop or Desktop, remove the HDD/SSD before attempting to diagnose & ensure they are kept away from kids, cats, dog, dirt, dust, static or magnets (HDD). Anti-static bags (free from 'puter store) are handy. Put 'em on the shelf until you figure out what the hell went wrong.

Quote: "Onion routing was developed by Michael G. Reed, Paul F. Syverson, and David M. Goldschlag [...] and patented by the United States Navy in US Patent No. 6266704 (1998). As of 2009, Tor is the predominant technology that employs onion routing."https://en.wikipedia.org/wiki/Onion_routing

Tails apparently puts one on a list. http://www.theregister.co.uk/2014/07/03/nsa_xkeyscore_stasi_scandal/

Freenet might be another possibility, but am loathe to run java. Am not certain how OpenJDK differs from java.https://freenetproject.org/whatis.html https://en.wikipedia.org/wiki/Freenet

WTF? I can post without entering the correct letters from CAPTCHA.That used to only happen with the horizontal letters, not the jumble.All i need do is ensure the number of characters is the same.Not hacking, nor cracking; just odd.

@stock - may i link to this topic & http://nukeprofessional.blogspot.ca/2014/07/low-quality-troll-invades-enenews.html ?

Some evidence beyond anonymous eyewitness reports is needed now.

The REAL Voice of "G": Deut.32:21Quote: "They have moved me to jealousy with that which is not God; they have provoked me to anger with their vanities: and I will move them to jealousy with those which are not a people; I will provoke them to anger with a foolish nation.For a fire is kindled in mine anger, and shall burn unto the lowest hell, and shall consume the earth with her increase, and set on fire the foundations of the mountains."Jer.16:17: "For mine eyes are upon all their ways: they are not hid from my face, neither is their iniquity hid from mine eyes."

“Let me tell you something you already know. The world ain't all sunshine and rainbows. It's a very mean and nasty place and I don't care how tough you are it will beat you to your knees and keep you there permanently if you let it. You, me, or nobody is gonna hit as hard as life. But it ain't about how hard ya hit. It's about how hard you can get hit and keep moving forward. How much you can take and keep moving forward. That's how winning is done!” ― Sylvester Stallone, Rocky Balboa

Are we certain the malicious links came from MBP??Was it a pdf??? Was itsanukularwhore's links to "cancercures" involved?

@anne - Quote: "My computer got more than 180 mal files when I linked to WesternKyMan's links at ATS."Is it possible that your 'puter got more than 180 mal files before linking to WKM's ATS shite? I checked one link so far, & VT says "nyet". Am of mind that links must be checked on live system on "real iron".

Quote of ISPC(i see 'em too, bud): "You may have noticed he bragged about his criminal asshosiates in the basement of the ciansa building cooking it up for us."http://enenews.com/nytimes-doctors-call-banning-thyroid-cancer-screening-tsunami-thyroid-cancer-stop-diagnosis-decrease-screening-need-actively-discourage-early-detection/comment-page-2#comment-600228

A disconnect from the internet & backup of data prior to cleaning seems IMPERATIVE if one suspects infection. Readers here might recognize that relying on MSE, Malwarebytes, etc. is like relying upon a sieve to retain water in it's liquid phase.

Quote: ""Why is it that Microsoft inserted a safe function into Windows 8 [but not] Windows 7? The answer is money - Microsoft does not want to waste development time on older operating systems ... and they want people to move to higher operating systems," Joseph said in a presentation at the Troopers14 conference.

Microsoft has been contacted for comment.

Together with malware analyst Marion Marschalek (@pinkflawd), the duo developed a capable diffing (comparison) tool dubbed DiffRay which would compare Windows 8 with 7, and log any safe functions absent in the older platform.

It was "scary simple", Marschalek said, and faster than finding vulnerabilities by hand."

Quote of ISPC: "Yes. stock. It was not just the trollware, our computers were hacked. The Administration and Owner File Permissions were deleted, and new Permissions were added, that is, another person was permitted to access and modify files. File Sharing and Remote Access were turned on, and Registry Entries were modified or deleted. I too was eventually forced to install a new operating system, well, two, as I partitioned for a dual boot Open Source Operating System. Both work smoothly, and I am quite happy and secure now. Thanks trollbothacks. I wouldn't have done it without you. Peace"

One would think Oak Ridge Nuke employees would recognize that all humanity has potential to make mistakes. Can you confirm that ManBearPig was from 50.142.165.12 too?

"People tend to make mistakes, and repeat them over and over until one finally learns from those mistakes. Eventually one might not make many repeated mistakes and tend to learn from other people's mistakes"

That was how i managed to avoid ever having a Workman's Compensation claim, or injured fellow employees.

They appear to be part of an industry that considers not their own humanity (or lack therof). It appears to be management policy. They appear extremely irresponsible (and prolly infected themselves too, though i don't see nary a one of them admit to such - Android AV cannot autoremove malware, iirc)

So, as that activity relates directly to employment, if any of them get so much as a hangnail during such malicious posting, are they not entitled to Workman's Compensation? If so, have any made previous claims?

Quote from AV-Comparatives:"a letter recently sent to 20 of the world's largest antivirus companies by Bits of Freedom, a Netherlands-based organization focused on digital rights. In that letter, the group asked whether the vendors had whitelisted government-authored malware. Most of those companies gave a prompt response in the negative, but U.S-based AV giants McAfee Inc. and Symantec Corp. never replied”. It is possible that intelligence/law-enforcement agencies in some countries prohibit vendors (security or otherwise) from revealing any co-operation with them.Some people may ask why malware such as Stuxnet and R2D2 remained undetected for many years. "

It's labelled as malicious, yet no explaination, no proof, no way to confirm or deny, no way to reproduce their results, other than to say it is "guilty" of linking to (hold on to your hat) www.google.de

24 January 2013 Quote: "We found the program would quite often report innocent pages as "potentially suspicious" for one reason or another, and you'll need some web development and security experience to properly understand its reports."

http://www.downloadcrew.com/article/29410-quttera_url_scanner

http://whois.domaintools.com/quttera.com

Mr. Novofastovsky might be of assistance, that is, if he wasn't in Isreal.

VirusTotal uses a voting/reporting system to determine that google.de is malicious or not.So, does Quttera use heuristics, or are they just expressing "corporate free speech"?

What can a blogger do? (an exposé, no?)Quote of anreas007: "site is good. Its a fault of VT that it will be submitted. A malwaresite uses a redirect to google when not accessed by a browser to try tomake it more hardfor automated analyzing tools like VT to analyze the page."